lockbit2 attacks IZO

Incident Date:

January 19, 2022

World map

Overview

Title

lockbit2 attacks IZO

Victim

IZO

Attacker

Lockbit2

Location

Alcobendas, Spain

Madrid, Spain

First Reported

January 19, 2022

IZO Ransomware Attack: A Cybersecurity Perspective

Company Profile

IZO is a company that specializes in consultancy and technology services, with a focus on transforming experiences for businesses. They have a strong reputation in their industry, offering a range of services including threat management, brand protection, anti-phishing, and digital asset management.

Vulnerabilities and Attack

The attack on IZO was likely carried out through a malicious ISO file, which led to a domain-wide ransomware infection. The ransomware, known as Quantum, encrypted all domain-joined systems and demanded a ransom from the victim.

Mitigation Strategies

To mitigate the risk of ransomware attacks, organizations should employ a data backup and recovery plan, keep their operating systems and software up-to-date, maintain up-to-date anti-virus software, restrict users' ability to install and run unwanted software, avoid enabling macros from email attachments, and educate staff about the risks and methods used by cybercriminals.

The attack on IZO serves as a reminder of the importance of cybersecurity in the business services sector. Companies must be vigilant against ransomware threats and implement robust security measures to protect their systems and data.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.